Full metadata record
DC FieldValueLanguage
dc.contributor.authorLin, Chu-Hsingen_US
dc.contributor.authorLee, Chen-Yuen_US
dc.contributor.authorKavi, Krishna M.en_US
dc.contributor.authorChen, Deng-Jyien_US
dc.contributor.authorYeh, Yi-Shiungen_US
dc.date.accessioned2014-12-08T15:32:26Z-
dc.date.available2014-12-08T15:32:26Z-
dc.date.issued2013-09-01en_US
dc.identifier.issn1016-2364en_US
dc.identifier.urihttp://hdl.handle.net/11536/22767-
dc.description.abstractOne-way hash functions play an important role in modem cryptography. Matusiewicz et al. proved that the message scheduling is essential for the security of SHA-256 by showing that it is possible to find collisions with complexity 2(64) hash operations for a variant without it. In this article, we first proposed the conjecture that message scheduling of SHA algorithm has higher security complexity (or fitness value in Genetic algorithm) if each message word (W-t) involves more message blocks (M-i) in each round. We found some evidence supports the conjecture. Consider the security of SHA-0 and SHA-1. Since Chabaud and Joux shown that SHA-1 is more secure than SHA-0. Further, Wang found collisions in full SHA-0 and SHA-1 hash operations with complexities less than 2(39) and 2(69), respectively. We found it is consistent from the viewpoint of message blocks (terms) involved in each message word. It clearly shown that the number of terms involved in SHA-1 is more than that in SHA-0, taking W-27 as an example, 14 and 6, respectively. Based on the conjecture we proposed a new view of complexity for SHA-256-XOR functions, a variant of SHA-256, by counting the terms involved in each equation, instead of analyzing the probability of finding collisions within SHA-256-XOR hash function. Our experiments shown that the parameter set in each equation of message schedule is crucial to security fitness. We applied genetic algorithms to find the near-optimal message schedule parameter sets that enhance the complexity 4 times for SHA-1 and 1.5 times for SHA-256-XOR, respectively, when compared to original SHA-1 and SHA-256-XOR functions. The analysis would be interesting for designers on the security of modular-addition-free hash function which is good for hardware implementation with lower gate count. And the found message schedule parameter sets would be a good reference for further improvement of SHA functions.en_US
dc.language.isoen_USen_US
dc.subjectgenetic algorithmsen_US
dc.subjectcryptographyen_US
dc.subjectsecure hash algorithmen_US
dc.subjectmessage schedulingen_US
dc.subjectoptimisationen_US
dc.titleFinding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithmsen_US
dc.typeArticleen_US
dc.identifier.journalJOURNAL OF INFORMATION SCIENCE AND ENGINEERINGen_US
dc.citation.volume29en_US
dc.citation.issue5en_US
dc.citation.spage889en_US
dc.citation.epage905en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000325302300006-
dc.citation.woscount0-
Appears in Collections:Articles


Files in This Item:

  1. 000325302300006.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.